1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
4 years ago
6

On most computers, the default font size in Word is ____. 8 11 14 16

Computers and Technology
1 answer:
julsineya [31]4 years ago
8 0
The font size depends on how the computer can handle font size or the monitor's size.
Mostly, it's 16.

To move one up paragraph, it's +UP ARROW
You might be interested in
Answer this question please
Oduvanchick [21]

Print slide

Print Selected

Print all slides

7 0
3 years ago
Lesson 2.7 Code Practice #2
scoundrel [369]

Answer:

no se ve unu ........unu

5 0
3 years ago
You need to immediately terminate process id 2129. which command should you use?
kolezko [41]
<span>The kill -9 2129, kill -s KILL 2129, or kill -KILL 2129 commands</span>
8 0
3 years ago
If directory server a trusts directory server b, directory server b trusts directory server c, and directory server a trusts dir
topjm [15]
This is a transitive trust which is a two-way correlation routinely made among parent and child domains in a microsoft active directory forest and when a new domain is produced, it bonds resources with its parent domain by evasion in which allowing an valid user to access resources in together the child and parent.
4 0
4 years ago
Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W
astraxan [27]
It will be elisa who will get to it
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following are valid values for a boolean value in programming? (Select all that apply)
    8·1 answer
  • Write a code that makes a 2D square array with 20×20 elements. Fill the array with random numbers initially. Then, "draw" a squa
    9·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • Which of the following Internet protocols is used to request and send pages and files on the World Wide Web?
    15·1 answer
  • Which type of fiber-optic connector, containing one fiber-optic strand per connector, is connected by pushing the connector into
    7·1 answer
  • How to change color of object in photoshop?
    10·2 answers
  • Why the internet is not considered a mass medium in Africa​
    13·2 answers
  • What is the difference between KE an PE
    8·1 answer
  • PLZZZZZ help will give brainleist <br> Two common sound files are?
    11·1 answer
  • On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!